- What is Networking?
- Compare and contrast OSI and TCP/IP models
- Compare and contrast TCP and UDP protocols
- Describe the impact of infrastructure components in an enterprise network
- What are Firewalls?
- What is an Access point?
- What are Wireless controllers?
- Describe the effects of cloud resources on enterprise network architecture
- Traffic path to internal and external cloud services
- Virtual services
- Basic virtual network infrastructure
- Compare and contrast collapsed core and three-tier architectures
- Compare and contrast network topologies
- What are Star network topologies?
- What are Mesh network topologies?
- What are Hybrid network topologies?
- Select the appropriate cabling type based on implementation requirements
- Apply troubleshooting methodologies to resolve problems
- Perform and document fault isolation
- Resolve or escalate
- Verify and monitor resolution
- Configure, verify, and troubleshoot IPv4 addressing and subnetting
- Compare and contrast IPv4 address types
- What is Unicast
- What is Broadcast
- What is Multicast
- Describe the need for private IPv4 addressing
- Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment
- Configure, verify, and troubleshoot IPv6 addressing
- Configure and verify IPv6 Stateless Address Auto Configuration
- Compare and contrast IPv6 address types
- Global unicast
- Unique local
- Link local
- Multicast
- Modified EUI 64
- Autoconfiguration
- Anycast
- LAN Switching Technologies
- Describe and verify switching concepts
- MAC learning and aging
- Frame switching
- Frame flooding
- MAC address table
- Interpret Ethernet frame format
- Troubleshoot interface and cable issues (collisions, errors, duplex, speed)
- Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches
- Access ports (data and voice)
- Default VLAN
- Configure, verify, and troubleshoot interswitch connectivity
- Trunk ports
- Add and remove VLANs on a trunk
- DTP, VTP (v1&v2), and 802.1Q
- Native VLAN
- Configure, verify, and troubleshoot STP protocols
- STP mode (PVST+ and RPVST+)
- STP root bridge selection
- Configure, verify and troubleshoot STP related optional features
- PortFast
- BPDU guard
- Configure and verify Layer 2 protocols
- Cisco Discovery Protocol
- LLDP
- Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel
- Static
- PAGP
- LACP
- Describe the benefits of switch stacking and chassis aggregation
- Routing Technologies
- Describe the routing concepts
- Packet handling along the path through a network
- Forwarding decision based on route lookup
- Frame rewrite
- Interpret the components of a routing table
- Prefix
- Network mask
- Next hop
- Routing protocol code
- Administrative distance
- Metric
- Gateway of last resort
- Describe how a routing table is populated by different routing information sources
- Admin distance
- Configure, verify, and troubleshoot inter-VLAN routing
- Router on a stick
- SVI
- Compare and contrast static routing and dynamic routing
- Compare and contrast distance vector and link state routing protocols
- Compare and contrast interior and exterior routing protocols
- Configure, verify, and troubleshoot IPv4 and IPv6 static routing
- What is contrast static routing?
- What is dynamic routing?
- What is contrast distance vector?
- Default route
- Network route
- Host route
- Floating static
- Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
- Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
- Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)
- Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)
- Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution)
- Full Form of PPP and MLPPP
- Troubleshoot basic Layer 3 end-to-end connectivity issues
- WAN Technologies
- Configure and verify PPP and MLPPP on WAN interfaces using local authentication
- Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication
- Configure, verify, and troubleshoot GRE tunnel connectivity
- Describe WAN topology options
- Point-to-point
- Hub and spoke
- Full mesh
- Single vs dual-homed
- Describe WAN access connectivity options
- MPLS
- Metro Ethernet
- Broadband PPPoE
- Internet VPN (DMVPN, site-to-site VPN, client VPN)
- Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)
- Describe basic QoS concepts
- Marking
- Device trust
- Prioritization and explain Voice, Video, Data, Shaping, Policing and Congestion management
- Infrastructure Services
- Describe DNS lookup operation
- What is Prioritization Voice?
- What is Prioritization Video?
- What is Prioritization Data?
- What is Prioritization Shaping?
- What is Prioritization Policing?
- What is Prioritization Congestion?
- Troubleshoot client connectivity issues involving DNS
- Configure and verify DHCP on a router (excluding static reservations)
- Server
- Relay
- Client
- TFTP, DNS, and gateway options
- Troubleshoot client- and router-based DHCP connectivity issues
- Configure, verify, and troubleshoot basic HSRP
- Priority
- Preemption
- Version
- Configure, verify, and troubleshoot inside source NAT
- Static
- Pool
- PAT
- Configure and verify NTP operating in a client/server mode
- Infrastructure Security
- Configure, verify, and troubleshoot port security
- Static
- Dynamic
- Sticky
- Max MAC addresses
- Violation actions
- Errdisable recovery
- Describe common access layer threat mitigation techniques
- 802.1x
- DHCP snooping
- Nondefault native VLAN
- Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering
- Standard
- Extended
- Named
- Verify ACLs using the APIC-EM Path Trace ACL analysis tool
Configure, verify, and troubleshoot basic device hardening - Local authentication
- Secure password
- Access to device
- Source address
- Telnet/SSH
- Login banner
- Describe device security using AAA with TACACS+ and RADIUS
Static - Pool
- PAT
- Configure and verify NTP operating in a client/server mode
- Infrastructure Management
- Configure and verify device-monitoring protocols
- SNMPv2
- SNMPv3
- Syslog
- Troubleshoot network connectivity issues using ICMP echo-based IP SLA
- Configure and verify device management
- Backup and restore device configuration
- Using Cisco Discovery Protocol or LLDP for device discovery
- Licensing
- Logging
- Timezone
- Loopback
- Configure and verify initial device configuration
- Perform device maintenance
- Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
- Password recovery and configuration register
- File system management
- Use Cisco IOS tools to troubleshoot and resolve problems
- Ping and traceroute with extended option
- Terminal monitor
- Log events
- Local SPAN
- Describe network programmability in enterprise network architecture
- Function of a controller
- Separation of control plane and data plane
- Northbound and southbound APIs